On Fri, 2 Feb 2001, Michael R. Jinks wrote:
> I may have read wrong, but I think he's trying to intercept mail --
> like, for reading, not for sending to the bit bucket.
>
> If that's the case, then that is most definitely not playing fair.
> Network managers, legal departments, and HR managers all take an
> exceedingly dim view of such things, not to mention the general ethics
> of systems administrators. It's just wrong, no matter what somebody may
> have done, to intercept their private conversations. It is even more
> wrong if you happen to be root somewhere on the network; root users are
> vested with an extra responsibility, even if nobody has ever told you
> so, to play extra-cautiously around the network.
>
> The things that PHD wants to do are exceedingly easy for a root user
> given the right kind of network; knowing how, and even sharing the
> information on how, is something that I believe all should be free to
> do; but actually doing so is the highest of crimes in the networked
> world, where privacy is rapidly being eroded from all sides as it is.
Definitely, I agree with you. I think that information should be shares,
(part of the reason I support FSF, EFF and 2600). However, I wouldnt be
the one to give him this information. He should read a book if he wants
to know that badly... two reasons:
a: Its easy to get someone to tell you how to do something, but you learn
so much more if you figure it out on your own.
b: since it may be illegal, and is definitely frowned upon, while the info
should be shared, I would never give such info to someone who asked like
he did. He basically said, I want to intercept someones mail... how do I
do it?
So I already know that his intentions are not just for education or
exploration...
oh well..
my 3 cents (inflation adjusted)
cheers
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list